1 00:00:08,090 --> 00:00:13,460 In the last video, you might have heard the term of digital signatures and certificates. 2 00:00:14,390 --> 00:00:22,640 This video we are going to learn about digital signatures and where are they used and what is the importance 3 00:00:23,180 --> 00:00:23,700 also? 4 00:00:24,110 --> 00:00:29,990 We will have a long discussion on the digital signature process so that you can understand the concept 5 00:00:30,320 --> 00:00:30,750 clearly. 6 00:00:31,430 --> 00:00:39,320 Let's start digital signatures like electronic fingerprints in the form of a coded message, the digital 7 00:00:39,320 --> 00:00:45,260 signature securely as a sign of the document in a recorded transaction. 8 00:00:46,370 --> 00:00:53,960 Digital signatures use a standard accepted format called public infrastructure, which we have already 9 00:00:53,960 --> 00:01:02,010 seen in the last video, B.K. is used to provide the highest levels of security and universal acceptance. 10 00:01:02,870 --> 00:01:08,840 They are a specific signature technology and implementation of electronic signatures that is e-signature. 11 00:01:10,030 --> 00:01:17,740 So in technical terms, a digital signature is a mathematical scheme for verifying the authenticity 12 00:01:17,770 --> 00:01:18,980 of a digital message. 13 00:01:19,750 --> 00:01:27,490 They are symmetric cryptography to simulate the security properties of a signature in the detail rather 14 00:01:27,490 --> 00:01:28,780 than in return for. 15 00:01:30,220 --> 00:01:36,400 Now, you have already heard of the term electronic signatures, so what is the difference between a 16 00:01:36,400 --> 00:01:39,300 digital signature and an electronic signature? 17 00:01:40,610 --> 00:01:46,580 The broad category of electronic signatures encompasses many types of electronic signatures. 18 00:01:47,600 --> 00:01:54,830 The category includes digital signatures, which are a specific technology implementation of electronic 19 00:01:54,830 --> 00:01:55,520 signatures. 20 00:01:56,540 --> 00:02:03,950 Both digital signatures and other signature solutions allow you to sign documents and authenticate the 21 00:02:03,950 --> 00:02:04,230 sign. 22 00:02:05,190 --> 00:02:13,010 However, there are differences in purpose, technical implementation, geographical use and legal and 23 00:02:13,010 --> 00:02:15,740 cultural acceptance of these signatures. 24 00:02:16,740 --> 00:02:24,270 In particular, the use of a digital signature technology for signatures varies significantly between 25 00:02:24,270 --> 00:02:31,790 countries that follow up on technology like the United States, United Kingdom, Canada and Australia. 26 00:02:33,900 --> 00:02:39,330 In the European Union, Southern America and Asia, these techniques are also. 27 00:02:40,850 --> 00:02:47,660 In addition, some industries also support specific standards that are based on digital signatures. 28 00:02:50,220 --> 00:02:52,480 Now, what is the use of a digital signature? 29 00:02:52,770 --> 00:02:55,380 Why can't you just go and sign the document? 30 00:02:55,980 --> 00:03:04,230 Well, if Bob or your friend is in the United States and you are in India, it would cost around one 31 00:03:04,230 --> 00:03:07,200 and a half left to go there and just sign the document. 32 00:03:08,240 --> 00:03:15,850 So digital signatures are used to send and receive encrypted emails that are digitally signed and secure, 33 00:03:16,580 --> 00:03:23,060 they carry out online secure transactions and they can identify participants online transaction. 34 00:03:24,360 --> 00:03:30,830 Digital signatures makes use of one of the most important elements of information security, of non 35 00:03:30,840 --> 00:03:31,570 repudiation. 36 00:03:32,280 --> 00:03:37,770 If you have digitally signed a document, you later cannot deny that you haven't signed the document. 37 00:03:38,920 --> 00:03:47,350 So digital signatures are used to sign and validate what documents excel in PDF format and everything. 38 00:03:50,630 --> 00:03:54,620 Digital signatures are a convenient way to authenticate an identity. 39 00:03:55,340 --> 00:03:59,810 It also provides high level of security for online transactions. 40 00:04:00,710 --> 00:04:05,240 Digital signatures are used to verify the identity of the sender of the message. 41 00:04:05,990 --> 00:04:10,480 Like I said, one cannot deny having digitally signed a document. 42 00:04:10,850 --> 00:04:16,700 These are signatures to an important role for designing and signing contracts of big Elution's. 43 00:04:18,040 --> 00:04:24,130 Digital signatures remain unchanged throughout the communication or documentation, and they're easily 44 00:04:24,130 --> 00:04:27,630 transportable and cannot be imitated by anyone else. 45 00:04:30,070 --> 00:04:36,130 Now, the most important thing is you have learned the theory part of digital signatures, so to get 46 00:04:36,130 --> 00:04:37,740 authority and get. 47 00:04:38,750 --> 00:04:42,890 It's time to actually see the process of digital signature. 48 00:04:44,430 --> 00:04:49,320 Well, how do digital signatures work, as you can see on your screen? 49 00:04:49,620 --> 00:04:50,790 This is a long process. 50 00:04:51,180 --> 00:04:53,340 Let's start exploring it by one. 51 00:04:53,340 --> 00:04:53,790 By one. 52 00:04:55,840 --> 00:05:03,520 Digital signatures, like handwritten signatures are unique to each sign digital signature solution 53 00:05:03,520 --> 00:05:12,220 providers such as DocuSign, for example, follow a specific protocol Patika that is public, the infrastructure. 54 00:05:13,280 --> 00:05:22,090 Bikaner requires the provider to use a mathematical algorithm to generate too long no call, Keith. 55 00:05:22,810 --> 00:05:26,260 We have seen keys in the cryptography introduction videos. 56 00:05:26,990 --> 00:05:30,560 One is the public key and another is a private. 57 00:05:32,150 --> 00:05:40,080 So when a sign electronically signs a document, the signature is created using the sign of priority, 58 00:05:40,640 --> 00:05:43,700 which is always securely kept by the sign. 59 00:05:44,360 --> 00:05:53,000 So suppose you are signing a document that which means that you are creating a document using your own 60 00:05:53,000 --> 00:05:53,750 private key. 61 00:05:55,070 --> 00:06:02,420 The mathematical algorithm acts like a cipher, creating data matching the signed document called Hash, 62 00:06:02,720 --> 00:06:06,720 and then it encrypts the results. 63 00:06:06,800 --> 00:06:09,890 Encrypted data is called as the digital signature. 64 00:06:11,110 --> 00:06:18,340 Signature is also marked with the time that the document was signed, so the document changes after 65 00:06:18,340 --> 00:06:21,340 signing the digital signature is Invalides. 66 00:06:23,570 --> 00:06:24,810 So let's take an example. 67 00:06:25,430 --> 00:06:29,330 Jeanne signed an agreement to set time-Share using her private. 68 00:06:30,410 --> 00:06:37,180 The buyer receives the document, the buyer who receives the document also receives a copy of Jean's 69 00:06:37,280 --> 00:06:37,760 public. 70 00:06:39,110 --> 00:06:41,540 Now, you may ask, these should be private. 71 00:06:41,870 --> 00:06:48,620 Well, well, well, public keys are of public knowledge and private key is only restricted to you. 72 00:06:49,870 --> 00:06:58,330 If the public can't decree the signature means that the signature is in jeans or has been changed since 73 00:06:58,330 --> 00:06:58,950 it was signed. 74 00:07:00,070 --> 00:07:08,230 So to me, in simple terms, Jean signs a certificate or a document with her private key, and if you 75 00:07:08,230 --> 00:07:13,350 are not able to decrypt it with hers publicly, then there's a problem. 76 00:07:14,740 --> 00:07:22,240 So to protect the integrity of the signature public infrastructure requires that the keys that are created 77 00:07:22,480 --> 00:07:25,900 and conducted should be saved and transported properly. 78 00:07:27,280 --> 00:07:34,930 In Reliable Men, digital signature providers like DocuSign or any other vendors you can take, meet 79 00:07:34,930 --> 00:07:37,990 the public key infrastructure requirements for digital sign. 80 00:07:38,970 --> 00:07:42,660 So as you can see on the screen, let's consider. 81 00:07:43,290 --> 00:07:47,250 There's a data that data goes to the harshing algorithm. 82 00:07:48,310 --> 00:07:56,830 Now, the output of the hash is encrypted, the sign ups priority and that entire thing is known as 83 00:07:57,130 --> 00:08:04,150 digitally signed document that is digital signature, not that digital sign document is sent over the 84 00:08:04,150 --> 00:08:12,520 Internet to the vendor to verify, verify, get the digital design document verifiable, applies the 85 00:08:12,910 --> 00:08:16,750 description of the key and gets the hash hidden. 86 00:08:16,750 --> 00:08:24,930 Applies hash algorithm, which is equal and therefore signature is validated when hash values are equal. 87 00:08:25,910 --> 00:08:32,510 Now, which Heschel used to compute in the upper figure, you can see this, a private key encryption, 88 00:08:32,930 --> 00:08:40,350 that hash value must be equal to the hash value that is obtained after decrypting. 89 00:08:41,000 --> 00:08:44,670 So this was a long lecture in the next lecture. 90 00:08:45,030 --> 00:08:48,020 We'll see what a transport layer security.